Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Accops Partners with C-DAC to Provide a Modern Facial Auth Solution for Global Companies

Accops, an Indian-origin provider of remote access products and solutions, has joined hands with Centre for Development of Advanced Computing (C-DAC), a premier R&D organization under Ministry of Electronics & Information Technology, Govt. of India, to build and deliver Accops BioAuth, a modern facial authentication solution with continuous user environment monitoring.

The state-of-the-art solution enables enterprises and government organizations to create a trusted work environment on demand and empower users of critical applications to be securely productive from wherever they are.

Built with the facial recognition technology developed by C-DAC, Accops BioAuth helps highly regulated businesses, such as BFSI, Pharma, BPO/KPO, and critical government departments and PSUs, prevent identity impersonation, shoulder surfing, credential sharing and authentication-related cyberattacks. Additionally, it may be useful for educational institutions as a remote proctoring solution.

Recommended AI: “Bitcoin Has No Intrinsic Value”. Then What Gives Bitcoin Value?

With an easy-to-integrate attribute, Accops’ facial authentication solution works with any cameras pre-installed in all laptops, PCs, and tablets today, to capture a user’s face and validate it against a pre-registered face template of the user. The user’s face template is securely stored in the centralized Accops BioAuth server installed in the organization’s datacenter.

When enabled, Accops BioAuth can continuously monitor the user’s work environment at pre-determined intervals to check for the authorized user’s presence, identity impersonation and shoulder surfing. It locks out the user if any anomaly is detected and the incident is reported to the organization for audit.

Backed by another patented technology for face liveness detection, Accops BioAuth can identify if the user sitting in front of the device is a living person or is a static photo, recorded video or another user with face mask. The technology avoids sending video file that consumes high bandwidth or asking user to look left/right which is inconvenient for users.

Related Posts
1 of 40,683

Recommended AI: Top 10 Countries and Cities by Number of CCTV Cameras

And unlike other solutions in the market, the Accops solution can be integrated with any application almost instantly, within a matter of minutes, without having to make any change or upgradation to the application. And its flexible workflow enables the maker-checker process for user onboarding possible in any complex organizational structure.

“A robust user authentication mechanism is the need of the hour to boost cybersecurity and ensures strict compliance with regulatory guidelines. Our facial authentication and liveness detection solution ensures that the users accessing business resources from homes are the same legitimate people who were verified and authorized,” says Vijender Yadav, CTO and Co-founder, Accops.

“C-DAC has been developing different technologies and products through R&D Projects funded by our Ministry of Electronics & Information Technology, Govt. of India. C-DAC aims to market these technologies and products so that it can be beneficial to organizations and society. Collaboration with Accops is an important step in this direction,” says Mrs. PR Lakshmi Eswari, Director, C-DAC Hyderabad.

On the privacy of users, Yadav explains, “At the time of the login or starting the work, the user is informed of such monitoring and asked for his or her consent. Users of critical data and applications are generally aware of the compliance requirements and the need for such monitoring in case they need to w*************. In fact, users working for critical processes and with critical data have been looking for such solutions so that they could also work from their homes whenever needed.”

Recommended AI: How is Artificial Intelligence (AI) Changing the Future of Architecture?

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.